-
Towards Green Communication: Soft Decoding Scheme for OOK Signals in Zero-Energy Devices
Authors:
Ticao Zhang,
Dennis Hui,
Mehrnaz Afshang,
Mohammad Mozaffari
Abstract:
The booming of Internet-of-Things (IoT) is expected to provide more intelligent and reliable communication services for higher network coverage, massive connectivity, and low-cost solutions for 6G services. However, frequent charging and battery replacement of these massive IoT devices brings a series of challenges. Zero energy devices, which rely on energy-harvesting technologies and can operate…
▽ More
The booming of Internet-of-Things (IoT) is expected to provide more intelligent and reliable communication services for higher network coverage, massive connectivity, and low-cost solutions for 6G services. However, frequent charging and battery replacement of these massive IoT devices brings a series of challenges. Zero energy devices, which rely on energy-harvesting technologies and can operate without battery replacement or charging, play a pivotal role in facilitating the massive use of IoT devices. In order to enable reliable communications of such low-power devices, Manchester-coded on-off keying (OOK) modulation and non-coherent detections are attractive techniques due to their energy efficiency, robustness in noisy environments, and simplicity in receiver design. Moreover, to extend their communication range, employing channel coding along with enhanced detection schemes is crucial. In this paper, a novel soft-decision decoder is designed for OOK-based low-power receivers to enhance their detection performance. In addition, exact closed-form expressions and two simplified approximations are derived for the log-likelihood ratio (LLR), an essential metric for soft decoding. Numerical results demonstrate the significant coverage gain achieved through soft decoding for convolutional code.
△ Less
Submitted 2 May, 2024;
originally announced May 2024.
-
On Improving the Performance of Glitch Classification for Gravitational Wave Detection by using Generative Adversarial Networks
Authors:
Jianqi Yan,
Alex P. Leung,
David C. Y. Hui
Abstract:
Spectrogram classification plays an important role in analyzing gravitational wave data. In this paper, we propose a framework to improve the classification performance by using Generative Adversarial Networks (GANs). As substantial efforts and expertise are required to annotate spectrograms, the number of training examples is very limited. However, it is well known that deep networks can perform…
▽ More
Spectrogram classification plays an important role in analyzing gravitational wave data. In this paper, we propose a framework to improve the classification performance by using Generative Adversarial Networks (GANs). As substantial efforts and expertise are required to annotate spectrograms, the number of training examples is very limited. However, it is well known that deep networks can perform well only when the sample size of the training set is sufficiently large. Furthermore, the imbalanced sample sizes in different classes can also hamper the performance. In order to tackle these problems, we propose a GAN-based data augmentation framework. While standard data augmentation methods for conventional images cannot be applied on spectrograms, we found that a variant of GANs, ProGAN, is capable of generating high-resolution spectrograms which are consistent with the quality of the high-resolution original images and provide a desirable diversity. We have validated our framework by classifying glitches in the {\it Gravity Spy} dataset with the GAN-generated spectrograms for training. We show that the proposed method can provide an alternative to transfer learning for the classification of spectrograms using deep networks, i.e. using a high-resolution GAN for data augmentation instead. Furthermore, fluctuations in classification performance with small sample sizes for training and evaluation can be greatly reduced. Using the trained network in our framework, we have also examined the spectrograms with label anomalies in {\it Gravity Spy}.
△ Less
Submitted 8 July, 2022;
originally announced July 2022.
-
BabyAI 1.1
Authors:
David Yu-Tung Hui,
Maxime Chevalier-Boisvert,
Dzmitry Bahdanau,
Yoshua Bengio
Abstract:
The BabyAI platform is designed to measure the sample efficiency of training an agent to follow grounded-language instructions. BabyAI 1.0 presents baseline results of an agent trained by deep imitation or reinforcement learning. BabyAI 1.1 improves the agent's architecture in three minor ways. This increases reinforcement learning sample efficiency by up to 3 times and improves imitation learning…
▽ More
The BabyAI platform is designed to measure the sample efficiency of training an agent to follow grounded-language instructions. BabyAI 1.0 presents baseline results of an agent trained by deep imitation or reinforcement learning. BabyAI 1.1 improves the agent's architecture in three minor ways. This increases reinforcement learning sample efficiency by up to 3 times and improves imitation learning performance on the hardest level from 77 % to 90.4 %. We hope that these improvements increase the computational efficiency of BabyAI experiments and help users design better agents.
△ Less
Submitted 24 July, 2020;
originally announced July 2020.
-
A Benchmark of Medical Out of Distribution Detection
Authors:
Tianshi Cao,
Chin-Wei Huang,
David Yu-Tung Hui,
Joseph Paul Cohen
Abstract:
Motivation: Deep learning models deployed for use on medical tasks can be equipped with Out-of-Distribution Detection (OoDD) methods in order to avoid erroneous predictions. However it is unclear which OoDD method should be used in practice. Specific Problem: Systems trained for one particular domain of images cannot be expected to perform accurately on images of a different domain. These images s…
▽ More
Motivation: Deep learning models deployed for use on medical tasks can be equipped with Out-of-Distribution Detection (OoDD) methods in order to avoid erroneous predictions. However it is unclear which OoDD method should be used in practice. Specific Problem: Systems trained for one particular domain of images cannot be expected to perform accurately on images of a different domain. These images should be flagged by an OoDD method prior to diagnosis. Our approach: This paper defines 3 categories of OoD examples and benchmarks popular OoDD methods in three domains of medical imaging: chest X-ray, fundus imaging, and histology slides. Results: Our experiments show that despite methods yielding good results on some categories of out-of-distribution samples, they fail to recognize images close to the training distribution. Conclusion: We find a simple binary classifier on the feature representation has the best accuracy and AUPRC on average. Users of diagnostic tools which employ these OoDD methods should still remain vigilant that images very close to the training distribution yet not in it could yield unexpected results.
△ Less
Submitted 4 August, 2020; v1 submitted 8 July, 2020;
originally announced July 2020.
-
Combating False Negatives in Adversarial Imitation Learning
Authors:
Konrad Zolna,
Chitwan Saharia,
Leonard Boussioux,
David Yu-Tung Hui,
Maxime Chevalier-Boisvert,
Dzmitry Bahdanau,
Yoshua Bengio
Abstract:
In adversarial imitation learning, a discriminator is trained to differentiate agent episodes from expert demonstrations representing the desired behavior. However, as the trained policy learns to be more successful, the negative examples (the ones produced by the agent) become increasingly similar to expert ones. Despite the fact that the task is successfully accomplished in some of the agent's t…
▽ More
In adversarial imitation learning, a discriminator is trained to differentiate agent episodes from expert demonstrations representing the desired behavior. However, as the trained policy learns to be more successful, the negative examples (the ones produced by the agent) become increasingly similar to expert ones. Despite the fact that the task is successfully accomplished in some of the agent's trajectories, the discriminator is trained to output low values for them. We hypothesize that this inconsistent training signal for the discriminator can impede its learning, and consequently leads to worse overall performance of the agent. We show experimental evidence for this hypothesis and that the 'False Negatives' (i.e. successful agent episodes) significantly hinder adversarial imitation learning, which is the first contribution of this paper. Then, we propose a method to alleviate the impact of false negatives and test it on the BabyAI environment. This method consistently improves sample efficiency over the baselines by at least an order of magnitude.
△ Less
Submitted 2 February, 2020;
originally announced February 2020.
-
Adaptive Ensemble of Classifiers with Regularization for Imbalanced Data Classification
Authors:
Chen Wang,
Chengyuan Deng,
Zhoulu Yu,
Dafeng Hui,
Xiaofeng Gong,
Ruisen Luo
Abstract:
The dynamic ensemble selection of classifiers is an effective approach for processing label-imbalanced data classifications. However, such a technique is prone to overfitting, owing to the lack of regularization methods and the dependence of the aforementioned technique on local geometry. In this study, focusing on binary imbalanced data classification, a novel dynamic ensemble method, namely adap…
▽ More
The dynamic ensemble selection of classifiers is an effective approach for processing label-imbalanced data classifications. However, such a technique is prone to overfitting, owing to the lack of regularization methods and the dependence of the aforementioned technique on local geometry. In this study, focusing on binary imbalanced data classification, a novel dynamic ensemble method, namely adaptive ensemble of classifiers with regularization (AER), is proposed, to overcome the stated limitations. The method solves the overfitting problem through implicit regularization. Specifically, it leverages the properties of stochastic gradient descent to obtain the solution with the minimum norm, thereby achieving regularization; furthermore, it interpolates the ensemble weights by exploiting the global geometry of data to further prevent overfitting. According to our theoretical proofs, the seemingly complicated AER paradigm, in addition to its regularization capabilities, can actually reduce the asymptotic time and memory complexities of several other algorithms. We evaluate the proposed AER method on seven benchmark imbalanced datasets from the UCI machine learning repository and one artificially generated GMM-based dataset with five variations. The results show that the proposed algorithm outperforms the major existing algorithms based on multiple metrics in most cases, and two hypothesis tests (McNemar's and Wilcoxon tests) verify the statistical significance further. In addition, the proposed method has other preferred properties such as special advantages in dealing with highly imbalanced data, and it pioneers the research on the regularization for dynamic ensemble methods.
△ Less
Submitted 5 November, 2020; v1 submitted 9 August, 2019;
originally announced August 2019.
-
On the Analysis of Puncturing for Finite-Length Polar Codes: Boolean Function Approach
Authors:
Song-Nam Hong,
Dennis Hui
Abstract:
This paper investigates the impact of puncturing on finite-length polar codes in which a puncturing pattern $\pv^{N}=(p_0,...,p_N)$ is applied to a length-$N$ polar code.. We first introduce two virtual channels to stochastically model the punctured (untransmitted) bits, which are respectively called {\em useless channel model} (UCM) and {\em deterministic channel model} (DCM). Under each model, w…
▽ More
This paper investigates the impact of puncturing on finite-length polar codes in which a puncturing pattern $\pv^{N}=(p_0,...,p_N)$ is applied to a length-$N$ polar code.. We first introduce two virtual channels to stochastically model the punctured (untransmitted) bits, which are respectively called {\em useless channel model} (UCM) and {\em deterministic channel model} (DCM). Under each model, we derive boolean functions in variables $p_0,...,p_{N-1}$ that can indicate which polarized channels should carry frozen bits. Based on this, we present an efficient method to jointly optimize a puncturing pattern and an information set. Focusing on a fixed information set, we show that there exist the so-called {\em catastrophic} puncturing patterns that will surely lead to a block error and derive their weight distributions recursively. We then propose the two construction methods of a rate-compatible (RC) polar code which ensures that each puncturing pattern in the family is non-catastrophic. Simulation results demonstrate that the proposed RC polar code outperform the RC Turbo code adopted in LTE.
△ Less
Submitted 15 January, 2018;
originally announced January 2018.
-
Capacity-Achieving Rate-Compatible Polar Codes for General Channels
Authors:
Marco Mondelli,
S. Hamed Hassani,
Ivana Marić,
Dennis Hui,
Song-Nam Hong
Abstract:
We present a rate-compatible polar coding scheme that achieves the capacity of any family of channels. Our solution generalizes the previous results [1], [2] that provide capacity-achieving rate-compatible polar codes for a degraded family of channels. The motivation for our extension comes from the fact that in many practical scenarios, e.g., MIMO systems and non-Gaussian interference, the channe…
▽ More
We present a rate-compatible polar coding scheme that achieves the capacity of any family of channels. Our solution generalizes the previous results [1], [2] that provide capacity-achieving rate-compatible polar codes for a degraded family of channels. The motivation for our extension comes from the fact that in many practical scenarios, e.g., MIMO systems and non-Gaussian interference, the channels cannot be ordered by degradation. The main technical contribution of this paper consists in removing the degradation condition. To do so, we exploit the ideas coming from the construction of universal polar codes.
Our scheme possesses the usual attractive features of polar codes: low complexity code construction, encoding, and decoding; super-polynomial scaling of the error probability with the block length; and absence of error floors. On the negative side, the scaling of the gap to capacity with the block length is slower than in standard polar codes, and we prove an upper bound on the scaling exponent.
△ Less
Submitted 20 January, 2017; v1 submitted 3 November, 2016;
originally announced November 2016.
-
A Unified Framework for Information Consumption Based on Markov Chains
Authors:
David Shui Wing Hui,
Yi-Chao Chen,
Gong Zhang,
Weijie Wu,
Guanrong Chen,
John C. S. Lui,
Yingtao Li
Abstract:
This paper establishes a Markov chain model as a unified framework for understanding information consumption processes in complex networks, with clear implications to the Internet and big-data technologies. In particular, the proposed model is the first one to address the formation mechanism of the "trichotomy" in observed probability density functions from empirical data of various social and tec…
▽ More
This paper establishes a Markov chain model as a unified framework for understanding information consumption processes in complex networks, with clear implications to the Internet and big-data technologies. In particular, the proposed model is the first one to address the formation mechanism of the "trichotomy" in observed probability density functions from empirical data of various social and technical networks. Both simulation and experimental results demonstrate a good match of the proposed model with real datasets, showing its superiority over the classical power-law models.
△ Less
Submitted 2 February, 2016;
originally announced February 2016.
-
Capacity-Achieving Rate-Compatible Polar Codes
Authors:
Song-Nam Hong,
Dennis Hui,
Ivana Marić
Abstract:
We present a method of constructing rate-compatible polar codes that are capacity-achieving with low-complexity sequential decoders. The proposed code construction allows for incremental retransmissions at different rates in order to adapt to channel conditions. The main idea of the construction exploits the common characteristics of polar codes optimized for a sequence of successively degraded ch…
▽ More
We present a method of constructing rate-compatible polar codes that are capacity-achieving with low-complexity sequential decoders. The proposed code construction allows for incremental retransmissions at different rates in order to adapt to channel conditions. The main idea of the construction exploits the common characteristics of polar codes optimized for a sequence of successively degraded channels. The proposed approach allows for an optimized polar code to be used at every transmission thereby achieving capacity.
△ Less
Submitted 27 January, 2016; v1 submitted 6 October, 2015;
originally announced October 2015.
-
A Novel Cooperative Strategy for Wireless Multihop Backhaul Networks
Authors:
Song-Nam Hong,
Ivana Maric,
Dennis Hui
Abstract:
The 5G wireless network architecture will bring dense deployments of base stations called {\em small cells} for both outdoors and indoors traffic. The feasibility of their dense deployments depends on the existence of a high data-rate transport network that can provide high-data backhaul from an aggregation node where data traffic originates and terminates, to every such small cell. Due to the lim…
▽ More
The 5G wireless network architecture will bring dense deployments of base stations called {\em small cells} for both outdoors and indoors traffic. The feasibility of their dense deployments depends on the existence of a high data-rate transport network that can provide high-data backhaul from an aggregation node where data traffic originates and terminates, to every such small cell. Due to the limited range of radio signals in the high frequency bands, multihop wireless connection may need to be established between each access node and an aggregation node. In this paper, we present a novel transmission scheme for wireless multihop backhaul for 5G networks. The scheme consists of 1) {\em group successive relaying} that established a relay schedule to efficiently exploit half-duplex relays and 2) an optimized quantize-map-and-forward (QMF) coding scheme that improves the performance of QMF and reduces the decoding complexity and the delay. We derive an achievable rate region of the proposed scheme and attain a closed-form expression in the asymptotic case for several network models of interests. It is shown that the proposed scheme provides a significant gain over multihop routing (based on decode-and-forward), which is a solution currently proposed for wireless multihop backhaul network. Furthermore, the performance gap increases as a network becomes denser. For the proposed scheme, we then develop energy-efficient routing that determines {\em groups} of participating relays for every hop. To reflect the metric used in the routing algorithm, we refer to it as {\em interference-harnessing} routing. By turning interference into a useful signal, each relay requires a lower transmission power to achieve a desired performance compared to other routing schemes. Finally, we present a low-complexity successive decoder, which makes it feasible to use the proposed scheme in practice.
△ Less
Submitted 1 August, 2015;
originally announced August 2015.
-
On the Achievable Rates of Multihop Virtual Full-Duplex Relay Channels
Authors:
Song-Nam Hong,
Ivana Maric,
Dennis Hui,
Giuseppe Caire
Abstract:
We study a multihop "virtual" full-duplex relay channel as a special case of a general multiple multicast relay network. For such channel, quantize-map-and-forward (QMF) (or noisy network coding (NNC)) achieves the cut-set upper bound within a constant gap where the gap grows {\em linearly} with the number of relay stages $K$. However, this gap may not be negligible for the systems with multihop t…
▽ More
We study a multihop "virtual" full-duplex relay channel as a special case of a general multiple multicast relay network. For such channel, quantize-map-and-forward (QMF) (or noisy network coding (NNC)) achieves the cut-set upper bound within a constant gap where the gap grows {\em linearly} with the number of relay stages $K$. However, this gap may not be negligible for the systems with multihop transmissions (i.e., a wireless backhaul operating at higher frequencies). We have recently attained an improved result to the capacity scaling where the gap grows {\em logarithmically} as $\log{K}$, by using an optimal quantization at relays and by exploiting relays' messages (decoded in the previous time slot) as side-information. In this paper, we further improve the performance of this network by presenting a mixed scheme where each relay can perform either decode-and-forward (DF) or QMF with possibly rate-splitting. We derive the achievable rate and show that the proposed scheme outperforms the QMF-optimized scheme. Furthermore, we demonstrate that this performance improvement increases with $K$.
△ Less
Submitted 23 April, 2015; v1 submitted 26 January, 2015;
originally announced January 2015.
-
Short Message Noisy Network Coding with Rate Splitting
Authors:
Ivana Maric,
Dennis Hui
Abstract:
Short message noisy network coding with rate splitting (SNNC-RS) encoding strategy is presented. It has been shown by Hou and Kramer that mixed cooperative strategies in which relays in favorable positions perform decode-and-forward (DF) and the rest of the relays perform short message noisy network coding (SNNC) can outperform noisy network coding (NNC). Our proposed strategy further improves the…
▽ More
Short message noisy network coding with rate splitting (SNNC-RS) encoding strategy is presented. It has been shown by Hou and Kramer that mixed cooperative strategies in which relays in favorable positions perform decode-and-forward (DF) and the rest of the relays perform short message noisy network coding (SNNC) can outperform noisy network coding (NNC). Our proposed strategy further improves the rate performance of such mixed SNNC-DF cooperative strategy. In the proposed scheme, superposition coding is incorporated into the SNNC encoding in order to facilitate partial interference cancellation at DF relays, thereby increasing the overall rate. To demonstrate gains of the proposed SNNC-RS strategy, the achievable rate is analyzed for the discrete memoryless two-relay network with one DF relay and one SNNC-RS relay and compared to the case without rate-splitting. The obtained rate is evaluated in the Gaussian two-relay network and gains over the rate achieved without rate splitting are demonstrated.
△ Less
Submitted 18 December, 2014; v1 submitted 31 March, 2014;
originally announced April 2014.
-
Computational Simulation and 3D Virtual Reality Engineering Tools for Dynamical Modeling and Imaging of Composite Nanomaterials
Authors:
L. -V. Bochkareva,
M. -V. Kireitseu,
G. R. Tomlinson,
H. Altenbach,
V. Kompis,
D. Hui
Abstract:
An adventure at engineering design and modeling is possible with a Virtual Reality Environment (VRE) that uses multiple computer-generated media to let a user experience situations that are temporally and spatially prohibiting. In this paper, an approach to develo** some advanced architecture and modeling tools is presented to allow multiple frameworks work together while being shielded from t…
▽ More
An adventure at engineering design and modeling is possible with a Virtual Reality Environment (VRE) that uses multiple computer-generated media to let a user experience situations that are temporally and spatially prohibiting. In this paper, an approach to develo** some advanced architecture and modeling tools is presented to allow multiple frameworks work together while being shielded from the application program. This architecture is being developed in a framework of workbench interactive tools for next generation nanoparticle-reinforced dam**/dynamic systems. Through the use of system, an engineer/programmer can respectively concentrate on tailoring an engineering design concept of novel system and the application software design while using existing databases/software outputs.
△ Less
Submitted 14 August, 2007;
originally announced August 2007.